CVE-2023-48431

A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 2). Affected software does not correctly validate the response received by an UMC server. An attacker can use this to crash the affected software by providing and configuring a malicious UMC server or by manipulating the traffic from a legitimate UMC server (i.e. leveraging CVE-2023-48427).
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:siemens:sinec_ins:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:sinec_ins:1.0:-:*:*:*:*:*:*
cpe:2.3:a:siemens:sinec_ins:1.0:sp1:*:*:*:*:*:*
cpe:2.3:a:siemens:sinec_ins:1.0:sp2:*:*:*:*:*:*
cpe:2.3:a:siemens:sinec_ins:1.0:sp2_update_1:*:*:*:*:*:*

History

14 Dec 2023, 19:37

Type Values Removed Values Added
References () https://cert-portal.siemens.com/productcert/pdf/ssa-077170.pdf - () https://cert-portal.siemens.com/productcert/pdf/ssa-077170.pdf - Patch, Vendor Advisory
CVSS v2 : unknown
v3 : 6.8
v2 : unknown
v3 : 8.6
First Time Siemens sinec Ins
Siemens
CPE cpe:2.3:a:siemens:sinec_ins:1.0:sp1:*:*:*:*:*:*
cpe:2.3:a:siemens:sinec_ins:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:sinec_ins:1.0:sp2:*:*:*:*:*:*
cpe:2.3:a:siemens:sinec_ins:1.0:sp2_update_1:*:*:*:*:*:*
cpe:2.3:a:siemens:sinec_ins:1.0:-:*:*:*:*:*:*
Summary
  • (es) Se ha identificado una vulnerabilidad en SINEC INS (Todas las versiones &lt; V1.0 SP2 Update 2). El software afectado no valida correctamente la respuesta recibida por un servidor UMC. Un atacante puede utilizar esto para bloquear el software afectado proporcionando y configurando un servidor UMC malicioso o manipulando el tráfico desde un servidor UMC legítimo (es decir, aprovechando CVE-2023-48427).

12 Dec 2023, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-12 12:15

Updated : 2023-12-14 19:37


NVD link : CVE-2023-48431

Mitre link : CVE-2023-48431

CVE.ORG link : CVE-2023-48431


JSON object : View

Products Affected

siemens

  • sinec_ins
CWE
CWE-754

Improper Check for Unusual or Exceptional Conditions